WEBVTT

00:00.130 --> 00:02.856
(lively music)

00:02.856 --> 00:05.150
- In the spirit of
cybersecurity awareness,

00:05.150 --> 00:08.250
and October being Cyber
Security Awareness Month,

00:08.250 --> 00:11.350
let's talk about what
you need to think about

00:11.350 --> 00:13.853
before you connect a
device onto the network,

00:15.020 --> 00:18.853
or should I say protect it if
you're going to connect it.

00:20.880 --> 00:23.780
Let's talk a little bit
about a network ashore.

00:23.780 --> 00:25.623
Let's talk about a network afloat.

00:26.830 --> 00:29.960
I think by now most folks know
that on our afloat networks

00:29.960 --> 00:31.070
or our ashore networks,

00:31.070 --> 00:33.240
there are certain things
that we absolutely

00:33.240 --> 00:35.460
do not connect to the network.

00:35.460 --> 00:39.130
For example, we do not
connect thumb drives.

00:39.130 --> 00:42.980
We do not connect our cell
phones, our mobile devices.

00:42.980 --> 00:45.660
In many cases, we don't even
bring our mobile devices

00:45.660 --> 00:49.950
into our command or into
certain spaces on ships.

00:49.950 --> 00:52.363
This is very important, why?

00:53.332 --> 00:56.333
Those are access vectors for
malicious cyber activity.

00:58.340 --> 01:00.120
Adversaries will use those

01:00.120 --> 01:02.670
to be able to gain access to our networks.

01:02.670 --> 01:05.830
So in the event that you do have a device

01:05.830 --> 01:08.220
that you might look to
connect to the network,

01:08.220 --> 01:11.790
it is absolutely imperative
that you protect it.

01:11.790 --> 01:14.210
And we have processes and procedures

01:14.210 --> 01:15.653
to ensure that we do that.

01:16.680 --> 01:17.890
That's where we can utilize

01:17.890 --> 01:20.560
our information security management shop,

01:20.560 --> 01:23.630
our communications and IT specialists,

01:23.630 --> 01:25.660
that we'll be able to take that device,

01:25.660 --> 01:27.630
they'll be able to scan that device,

01:27.630 --> 01:31.000
they'll be able to ensure that
that device is cyber secure

01:31.000 --> 01:34.680
before we have a need to
connect it to the network.

01:34.680 --> 01:37.680
Those devices might be
something like a printer.

01:37.680 --> 01:39.190
It might be something like a scanner

01:39.190 --> 01:40.873
for a special purpose mission.

01:41.820 --> 01:45.940
They might even be something
as simple as speakers,

01:45.940 --> 01:49.670
but all those devices must be safe-proofed

01:49.670 --> 01:51.870
before we connect them to the network.

01:51.870 --> 01:53.840
So again, I urge you to think.

01:53.840 --> 01:56.453
Before you connect, make sure you protect.

